2-6 Flashcards

1
Q

essentially a technique used by hackers to gain unauthorized access to computers. its occasionally done to maskthe origins of a DoS attack

A

ip spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

these often mask the actual IP address from which they are attacking

A

DoS and DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The intruder sends messages to a computer system with an IP address indicating that the message came from a different IP address then it actually came from

A

ip spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a couple of different ways to address IP spoofing includes _______

A

do not reveal any info reguarding your internal IP address

monitor incoming IP packets for signs of IP spoofing using software / firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a danger of ip spoofing includes some firewalls do not ______________

A

examine packets that appear to come from inside the netowrk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a process whereby a hacker takes over a tcp session between two machines

A

TCP hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

sourced routed ip packets allow a hacker at point a in a network to participate in a conversation between point b and c encouraging the IP packets to pass through the hackers machine

A

session hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the most common form of session hacking is

A

man in the middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the point of ______________________ is to exploit trust and to gain aces to a system to which one would not otherwise have access

A

hijacking a connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the ony way to prevent session hijacking is to use

A

encrypted transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

software that intercepts packets going across a network or the internet and copies them

A

packet sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a program that self replicates

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a virus that an replicate without human interaction

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

famous virus with rapid high volume scanning

A

Slammer virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

key to topping a computer virus is to

A

prevent it from spreading to other systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a virus is spread though one of 2 ways. scanning a computer and _________ to other machines on the network to whichthe machine has access. the other way is by reading an email address book and _________ everyone in it

A

copying itself // sending itself